CVE-2022-31020: Indy's NODE_UPGRADE transaction vulnerable to remote code execution
(updated )
The pool-upgrade
request handler in Indy-Node <=1.12.4
allows an improperly authenticated attacker to remotely execute code on nodes within the network.
Network operators are strongly encouraged to upgrade to the latest Indy-Node release >=1.12.5
as soon as possible.
References
- github.com/advisories/GHSA-r6v9-p59m-gj2p
- github.com/hyperledger/indy-node
- github.com/hyperledger/indy-node/commit/fe507474f77084faef4539101e2bbb4d508a97f5
- github.com/hyperledger/indy-node/releases/tag/v1.12.5
- github.com/hyperledger/indy-node/security/advisories/GHSA-r6v9-p59m-gj2p
- github.com/pypa/advisory-database/tree/main/vulns/indy-node/PYSEC-2022-265.yaml
- nvd.nist.gov/vuln/detail/CVE-2022-31020
Detect and mitigate CVE-2022-31020 with GitLab Dependency Scanning
Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →